Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
6651ff67fca7414bcc1a9dc2839a5612.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6651ff67fca7414bcc1a9dc2839a5612.html
Resource
win10v2004-20231222-en
General
-
Target
6651ff67fca7414bcc1a9dc2839a5612.html
-
Size
18KB
-
MD5
6651ff67fca7414bcc1a9dc2839a5612
-
SHA1
6c4d70ce7954f52a04e1314ea9a449d96445062e
-
SHA256
e477266cb47e8813a063dec727711d136d8ec1b4927383f9b1aca27f1ee12d44
-
SHA512
fe7530dc5218ae68d3950077338a751c6115ba168ca51f44a8bb215382ecad95c0271e5ed5c80d84b613535c2f6768e2371bec0e4b381dadea2c19375593ce3b
-
SSDEEP
384:sPlIc4t74TlGTH2Rh5wZXc/gukBgbnJGCKx+0LB9eguLZ:+tgMox6xLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411792874" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9659CE1-B671-11EE-8837-E6629DF8543F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1252 2108 iexplore.exe 26 PID 2108 wrote to memory of 1252 2108 iexplore.exe 26 PID 2108 wrote to memory of 1252 2108 iexplore.exe 26 PID 2108 wrote to memory of 1252 2108 iexplore.exe 26
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6651ff67fca7414bcc1a9dc2839a5612.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553caf38236a5d190c968dfde5448de69
SHA195571c53f675915c948b00e00e8f2c28c7c3a265
SHA25626c77373b8c42b05ef4d8487a333b7608bbd0803e787fa4370164e628e71ecf0
SHA51273f5ad60fc241e1670b67c67f0bb11151dbd39d6648edcdd80a5260d271484b820b26c5ebf767c891d59b3411c114a8e6026edf3795ce2e191c9ef89c2da2231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9e358dbb5d205279efeee4fb2c565b9
SHA193fb7cc235399d563f4b1ad857f058665dbabf50
SHA256e97d97bbb27c4408d26ca70260f223e225ade240f814cfaf327d405750d250b5
SHA512f0fb42c76effe2cc23bc5a354209c7ac858261955901ed98cfe514ba6201fad322df2c8745f1ac2caebcdc194bdaf47c5886677ff8efae5bac5d4d3a3432b172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceca6e8df3b18f7cffcfa6cf1a3787e1
SHA15fef47e6c4db2128c183a396023d3e7e6f3bdcec
SHA256a63d8bf934a56a5794e1ad26eae816e9d2db29b6ef6eff7f2b3024ec224c9fb8
SHA51228b3ab367b07bb3da095302005cdddb57b36b571a4f217ab865c04d04f898c9c8ff9384936992a439329ac7477b047cd0e285fdd29f46e6b65773e13877268b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e075edfe2981f8471d860acdb104e627
SHA17ae3fc4adda524bcb9894bbda3ca415e845bd9d2
SHA256a46ccd3f7038cc8e30deb6391a0ef0086f72113c170bcb9e0f793c6a86a27f83
SHA512c4b2a97296e7acf33413af9822c73bdb511f1dcf9c6e0e175e0b14f2934b28a6f531ff01b718c6ded1e7a77494ba6f340c7b41f413e1b9dba515c6cb30e3d2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da29ff9a5512f3018251143f55d1fa00
SHA121c075d4ca3b7bf2ee6dec18a643e8a467c4f394
SHA256592ca2e6588c282a4c91ed37836249ac9287ff8b1e9ced55a6b73016666066ff
SHA5124d9bd54647b0eb49839776119c40d44e8838d3902e2bd317f46dd74639f9cce980babaaa16992d738177d70503bf44297bb8009e28d748ef5d36d1d3d91a0ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586ddf796b644beabd2efe70d54e8b2ae
SHA1f78cced7643a49d755d8719041f3b2163a945157
SHA25671e1b1f6ded255c877b8a60daa7ae83457924b3957463e8f9ce8eec305c414bf
SHA512d3a63c79682ea86f26dfa67665a2490dcbfc1e298ab79ee8bd47d782a1521e5220db09403fb6e89d7745658c2b8ab50c0340ea3316340d36a0b7fb7ae543404a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c3b4b6de85b42f2af34c0da425f62ea
SHA1c67719008d1daa94447ef417a988dc86f523c9f6
SHA256d0daf18b55a21d6f096db3578f01e13c10a31e091100f8f684f1e75d073d66ea
SHA512ba61f6dceb85e4bcda079621a61db11ee3042052f49be9268a4422e2aca00a02c78efb1de3b3507407d606f13e08a13052e9be7f28b90d9ee3388f25bedb78bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7c5dec5604c26a78796b151cc3a1bcf
SHA1ccf13ba4333c9c503b9cca56feba6413bd922196
SHA256bf2160d36555666fc757528493a0c2d56945ee54324a3c6566ecef9bc7c56b83
SHA512f7e687743120d6430b3c8f2784682e7a1341ae55232b37ff5deb61d3b1a7f059c2e5e9bbe3b017b712396967215c7cb1479a8cfd9e4850af7f5fbe5c82641cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9055f8d22c8243b2acb4943c0934600
SHA14650ffa79565ad358e202d924567b64a30cfb8c2
SHA25633b80145de6d300023d9d2c67d6372f76a6e29c5ab4b56700c51df200e8d4397
SHA5122b05f7d86dd80d6aa16c9ee229368e5ab194b617759cab421b73b6e9ce7d9a78d30a5b28d25a5dac1cb3619e7c9979b85cbc6122f8927c67c6b97aeb1506283d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06